Category: Social Engineering
-
Bonnie Smyre
posted on
Would you know if you were being “smished” or “vished”? Let Raxis’ CTO Brian Tant explain how hackers use these techniques.
-
Brian Tant
posted on
In this video, Raxis CTO Brian Tant talks about three steps you should take to secure your network against hackers.
-
Brad Herring
posted on
Raxis was honored to present at the (ISC)² Atlanta Chapter Meeting last Thursday. The topic was Social Engineering and understanding how the high success rates of social engineering impacts network security.
-
Bonnie Smyre
posted on
Raxis COO Bonnie Smyre discusses physical social engineering, which tests to see how your employees and systems react when someone who should not be allowed access attempts to get past your controls to gain access to your sensitive information and networks.
-
Bonnie Smyre
posted on
Raxis COO Bonnie Smyre discusses voice or phone phishing, also know as vishing, and how you can train your employees not to fall for the bait.
-
Bonnie Smyre
posted on
Raxis helps many companies avoid corporate and customer information leakage from phishing emails targeted at unsuspecting employees. Raxis COO Bonnie Smyre tells more here.
-
Brian Tant
posted on
An effective information security program is built upon a strong physical security strategy. After all, if an attacker can breach your physical security all of the network controls are more easily mitigated. On average our internal network penetration tests yield an 85% success rate. Once an attacker physically gains access to network connectivity, the chances of a data breach become exponentially higher.
-
Brad Herring
posted on
Raxis VP of Business Development Brad Herring discusses the risks associated with using public USB charging ports.
-
Brad Herring
posted on
Raxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company.
-
Brad Herring
posted on
Raxis VP of Business Development Brad Herring discusses social engineering and how many hackers take the easy path & trick employees into giving them access.